Security Bytes:

January, 2010

Coding technique designed to tie up reverse engineers has been used in the past, Symantec says.
Researchers reverse engineering the malware used in a string of attacks against Google and at least 30 other firms and government agencies, has found the cybercriminals behind the...

Popular search term exploited to funnel users to a rogue search engine. A variety of tactics continue to prey on search engine users.
Research analysts at Trend Micro have identified another attack attempting to use popular search terms in Google and other search engines. Using...

Mobile banking app tries to gain access to financial data. App removed from Android marketplace.
In what could be one of the first signs that attackers are testing smartphones as another way to gain access to sensitive information, a Beaverton, Oregon credit union is warning its...

Analyst and research firm Securosis announced today that it will merge with Security Incite, the popular blog and analysis site founded by Pragmatic CSO author Mike Rothman.
Everything will remain under the...